Latest posts

Sharing and storing data? File this away

How are telecommuters sharing the files, folders and communications generated in the course of collaborating? And what measures are taken to protect privacy, ensure safety and meet compliance? The answers matter.

Continue reading

Organized cybercrime: bad guys go pro, highlighting “customer service”

This increasing “professionalization” of the cybercrime industry is troubling for many reasons. Security expert, Deb Shinder looks into this.

Continue reading

UPDATE: Patch problems galore – and a community-provided fix

Microsoft update causes problems for users affecting Outlook archived mailboxes and some experiencing blue screens. Community provided fix available.

Continue reading

Top 10 free tools for network monitoring and analysis [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

You’ve got (malicious) mail

Unfortunately, email-based malware has gotten much more malevolent over time. And security pros should not see email as “old hat” or an outdated form of attack. Deb Shinder explains why.

Continue reading

August Patch Tuesday roundup

Nine security bulletins were released in August, addressing 37 vulnerabilities, most of them in Windows and a few in server products.

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

Microsoft bumps up security on IE after it earns title of “most exploited browser”

Microsoft is adding a new security feature to Internet Explorer. It’s called Out-of-date ActiveX Control Blocking.

Continue reading

Five great ways to stay in control of a mobile workforce

With mobile working widely expected to continue gaining in popularity, IT departments need to know how to maintain control and security of IT infrastructure. Here are five tips on how to do that.

Continue reading

The case for building a BYOD policy

Whether you’re looking to build a basic BYOD policy or one that’s tailored for your company’s specific needs, the project involves the same steps. Here’s a step-by-step guide.

Continue reading